Cryptography – Communication system using cryptography – Symmetric key cryptography
Reexamination Certificate
2007-08-28
2007-08-28
Zand, Kambiz (Department: 2134)
Cryptography
Communication system using cryptography
Symmetric key cryptography
Reexamination Certificate
active
10270040
ABSTRACT:
A method for encrypting data comprising dividing a first data set into a second data set and a third data set; deriving a first value using the second data set as an input into a polynomial equation; deriving a second value using the third data set as an input into the polynomial equation; deriving a first encryption key associated with a first party; deriving a second encryption key associated with a second party; encrypting the first value with the first encryption key; encrypting the second value with the second encryption key.
REFERENCES:
patent: 4322577 (1982-03-01), Brandstrom
patent: 4514592 (1985-04-01), Miyaguchi
patent: 5199070 (1993-03-01), Matsuzaki et al.
patent: 6064740 (2000-05-01), Curiger et al.
patent: 6182216 (2001-01-01), Luyster
patent: 6192129 (2001-02-01), Coppersmith et al.
patent: 6389534 (2002-05-01), Elgamal et al.
patent: 6560338 (2003-05-01), Rose et al.
patent: 6578061 (2003-06-01), Aoki et al.
patent: 6782039 (2004-08-01), Alamouti et al.
patent: 6853988 (2005-02-01), Dickinson et al.
patent: 6888941 (2005-05-01), Rose
patent: 6895507 (2005-05-01), Teppler
patent: 6925563 (2005-08-01), Jennings
patent: 6937731 (2005-08-01), Chiu
patent: 6963976 (2005-11-01), Jutla
patent: 7096204 (2006-08-01), Chen et al.
patent: 2002/0010772 (2002-01-01), Kusano
patent: 2002/0032312 (2002-03-01), Deo et al.
patent: 2002/0172367 (2002-11-01), Mulder et al.
patent: 2003/0051129 (2003-03-01), Razdan et al.
patent: 2004/0030652 (2004-02-01), Grunzig et al.
patent: 0 354 774 (1990-02-01), None
patent: 0 723 348 (1996-07-01), None
patent: 0 851 629 (1998-07-01), None
patent: 1 043 862 (2000-10-01), None
patent: 2001-244924 (2000-09-01), None
patent: 96/05674 (1996-02-01), None
patent: 01-06697 (2001-01-01), None
patent: 01/11527 (2001-02-01), None
Cocks, C., “An Identity Based Encryption Scheme based on Quadratic Residues,” Communications—Electronics Security Group, PO Box 144, Cheltenham GL52 5UE (4 pages).
Boneh, D., et al., “Identity-Based Encryption from the Weil Pairing,” (pp. 1-30).
Shamir, A., “How to Share a Secret”,Nick Szabo's Papers and Concise Tutorials, http://szabo.best.vwh.net/secret.html (retrieved Jun. 25, 2006).
Boneh, D., et al., “Identity-Based Encryption from the Weil Pairing”,Proceedings of Crypto′ 2001.
Krawczyk, H., “Secret Sharing Made Short”, pp. 136-146, Springer Verlag (1998).
Menezes, A., et al., “Handbook of Applied Cryptography”, Ch. 12, pp. 524-528 (1997).
Chen Liqun
Harrison Keith Alexander
Hewlett--Packard Development Company, L.P.
Wyszynski Aubrey H
Zand Kambiz
LandOfFree
Method and apparatus for encrypting data does not yet have a rating. At this time, there are no reviews or comments for this patent.
If you have personal experience with Method and apparatus for encrypting data, we encourage you to share that experience with our LandOfFree.com community. Your opinion is very important and Method and apparatus for encrypting data will most certainly appreciate the feedback.
Profile ID: LFUS-PAI-O-3899359